Sciweavers

2947 search results - page 151 / 590
» The timely token protocol
Sort
View
FC
2010
Springer
196views Cryptology» more  FC 2010»
15 years 6 months ago
Secure Computation with Fixed-Point Numbers
Abstract. Secure computation is a promising approach to business problems in which several parties want to run a joint application and cannot reveal their inputs. Secure computatio...
Octavian Catrina, Amitabh Saxena
114
Voted
ADHOC
2008
59views more  ADHOC 2008»
15 years 5 months ago
Sacrificing a little coverage can substantially increase network lifetime
We present a simple, local protocol, pCover, which provides partial (but high) coverage in sensor networks. Through pCover, we demonstrate that it is feasible to maintain a high c...
Limin Wang, Sandeep S. Kulkarni
SAC
2008
ACM
15 years 4 months ago
Conflict-aware load-balancing techniques for database replication
Middleware-based database replication protocols require few or no changes in the database engine. As a consequence, they are more portable and flexible than kernel-based protocols...
Vaide Zuikeviciute, Fernando Pedone
ACSAC
2008
IEEE
15 years 11 months ago
A Survey to Guide Group Key Protocol Development
A large number of papers have proposed cryptographic protocols for establishing secure group communication. These protocols allow group members to exchange or establish keys to en...
Ahren Studer, Christina Johns, Jaanus Kase, Kyle O...
ICC
2007
IEEE
141views Communications» more  ICC 2007»
15 years 11 months ago
AMAC: Traffic-Adaptive Sensor Network MAC Protocol through Variable Duty-Cycle Operations
—Sensor network MAC protocols usually employ periodic sleep and wakeup, achieving low duty-cycle to save energy and to increase the lifetime of battery-powered sensor devices. Ho...
Sang Hoon Lee, Joon Ho Park, Lynn Choi